DarthRa / LinuxMalwareSourceCodeLinks
This is a repository of the source code of various malware targeting the *nix (mostly Linux) operating systems.
☆14Updated 8 years ago
Alternatives and similar repositories for LinuxMalwareSourceCode
Users that are interested in LinuxMalwareSourceCode are comparing it to the libraries listed below
Sorting:
- Reversed source code to the Babuk ransomware builder.☆17Updated 3 years ago
- Simple keylogger on C++ with several functions.☆17Updated 5 years ago
- Information Stealers Wall of Sheep (IS-WOS)☆12Updated 4 years ago
- An advanced Ransomware with CryptoGraphy and all the stuff.☆7Updated 4 years ago
- -x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.☆43Updated 3 years ago
- This is most dangerous botnet. No Spread needed. botnet infecting cctv,dvr etc.☆32Updated 8 years ago
- Network worms capable of stealing files from and deleting sensitive information from remote system.☆19Updated 8 years ago
- Cryline project - It's a simple test ransomware for Windows OS without stable encryption. Pls use this source code for study purposes on…☆56Updated last month
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆98Updated 4 years ago
- Well, I have created this shit for educational pruposes (I think)☆36Updated 2 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 6 years ago
- My (OLD) RE Take On The Faux Green Petya Ransomware Builder & Client.☆21Updated 3 years ago
- Author: Vitali Kremez. [Targets the following POS malware: *POSCardStealer.O *Dexter *Alina *POSmalware *JackPos *BlackPOS] [Function: C…☆22Updated 7 years ago
- The Mirai malware modified for use on NCL/a virtual/simulated environment.☆46Updated 2 years ago
- Persistent & Undetectable Malware Backdoor☆27Updated last year
- EXXX EVASION | Metasploit Antivirus Evasion | Fully Undetectable Payloads☆30Updated 5 years ago
- DarkComet☆13Updated 2 years ago
- The Open Tor Botnet (ZIB)☆30Updated 9 years ago
- Malicious Software SRC Extract☆31Updated 2 years ago
- Decompiled NotPetya File Encryptor Code☆14Updated 2 years ago
- Reversed source code of the Babuk Ransomware Version 1☆20Updated 4 years ago
- A light C# implant that bypasses Windows Firewall and Defender☆22Updated 3 years ago
- HTTPBotNet☆21Updated 3 months ago
- Triple OS Malware development framework [ MacOS, Linux & Windows ]☆15Updated 7 months ago
- Driver reverse engineering of the Russian Sandworm hacking group's BlackEnergy malware.☆16Updated 4 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆59Updated 8 years ago
- Carbanak leaked source☆73Updated 6 years ago
- Fud Persistent Windows Backdoor developed purely in python☆29Updated 4 years ago
- DarkCrypter encrypts your files and generates undetectable payloads to evade all anti-virus vendors.☆22Updated 2 years ago
- Source code of Claw Key logger previously sold on HackForums☆56Updated 2 years ago